Sciweavers

97 search results - page 11 / 20
» Modeling and Enforcing Advanced Access Control Policies in H...
Sort
View
CAISE
2010
Springer
13 years 8 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
AICCSA
2008
IEEE
222views Hardware» more  AICCSA 2008»
13 years 10 months ago
Managing access and flow control requirements in distributed workflows
Abstract. Workflows are operational business processes. Workfow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 3 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
ESOP
2004
Springer
14 years 2 months ago
A Dependently Typed Ambient Calculus
The Ambient calculus is a successful model of distributed, mobile computation, and has been the vehicle of new ideas for resource access control. Mobility types have been used to e...
Cédric Lhoussaine, Vladimiro Sassone
CCS
2008
ACM
13 years 10 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...